MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network....

25
MobileIron: Mobile-centric, Zero Trust Security David Critchley Regional Director, UK & Ireland

Transcript of MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network....

Page 1: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron:Mobile-centric, Zero Trust Security

David CritchleyRegional Director, UK & Ireland

Page 2: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

Our MobileIron Team

• Martin Granger, Sector Lead (PS & Housing)

• Garry Cobb, Pre-Sales Manager

• Belinda Turnbull, Sales & Partner Development

Page 3: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

DISCLAIMER

Statements in this presentation concerning future prospects, business outlook, and product availability and plans are forward looking statements that involve a number of uncertainties and risks. Factors that could cause actual events or results to differ materially include: sales productivity; possible disruptive effects of organizational changes; shifts in customer demand; perceptions of MobileIron and its prospects; technological changes; competitive factors; unanticipated delays in scheduled product availability dates; general business conditions; delays and inabilities in negotiating third partner partnerships, and other factors. The information on the roadmap is intended to outline our general product direction and it should not be relied upon in making purchasing decisions. The information on any roadmap shown is not a commitment, promise or legal obligation to deliver any material, code or functionality. The development, release and timing of any features or functionality described for our products remains at MobileIron’s sole discretion. Future product will be priced separately. This roadmap does not constitute an offer to sell any product or technology.

Page 4: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

MOBILE IS AT THE CENTER OF OUR UNIVERSE

Page 5: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

Smartphones over PCs

Website traffic from phones

Phone looks per day

Page 6: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

Higher throughput from 5G vs 4G

Daily active users on Slack

The second most popular app category

Page 7: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

of enterprises are using cloud

is the average number of cloud apps

an enterprise uses

MOBILE AND CLOUD ARE MAKING THE ENTERPRISE PERIMETER DISAPPEAR

MobileIron Confidential

Page 8: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

THIS SHIFT REQUIRES A NEW SECURITY APPROACH

Page 9: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

THE ZERO TRUST APPROACH

Never trust, always verify

Validate the device

Establish user context

Check app authorization

Verify networks

Detect and remediate threats

On-going compliance enforcement

Assume bad actors are on your network

MobileIron Confidential

Page 10: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

WHO’S GOING TO FULLY SECURE AND UNLEASH THE POWER OF A

PERIMETER-LESS MOBILE ENTERPRISE?

Identity-centricapproach?

Gateway-centricapproach?

Device-centricapproach?

Limited visibility on device, app, and threats

Passwords are a security risk.

Limited visibility on device, app, and threats

25% enterprise traffic doesn’t go through the enterprise network

Comprehensive correlation between user, device, app, networks and

threats

Mobile is at the center of the enterprise

No. No. Yes.

MobileIron Confidential

Page 11: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

Grant access

based on full context

(user, device, app, network, threat, time,

location and OS)

Provision any device for a user

with the appropriate apps, profiles and

policies

Protect data

at rest and in motion by containerizing and eliminating

threats on the device

Enforce

security policies (user, device, app,

network, threat, time, location and OS)

A ZERO TRUST MOBILE-CENTRIC APPROACH

Page 12: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

HOW IDENTITY, GATEWAY AND EMMAPPROACHES STACK UP TODAY

MobileIronapproach:

Gatewayapproach:

Deviceapproach:

Identityapproach:

MobileIron Confidential

Page 13: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

Ever-present Biometrics becomingyour identity

Amazing consumer experiences

MOBILE: MORE POWERFUL THAN YOU THINK

Page 14: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

MAKE MOBILE YOUR ID IN THE ENTERPRISEUse the foundation of UEM to set up Zero Trust access from any device,

any OS, any location, to any service

MobileIron Confidential

Page 15: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

Adding cloud services?

Enabling new types of devices and

users? Mam only,

task workers, Mac OS

Protect data on the device from

threats?

Want to enforce the broadest set of security policies?

A ZERO TRUST MOBILE-CENTRIC APPROACH WHERE ARE YOU ON YOUR JOURNEY TO ZERO TRUST?

MobileIron Confidential

Page 16: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

HOW MOBILEIRON CAN HELP YOU

ON YOUR PATH TODAY

Page 17: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

A ZERO TRUST MOBILE-CENTRIC ARCHITECTURE FOR THE HYBRID ENTERPRISE

Detection and Remediation

Cloud security

Intelligent gateway

Policy engine

On-device monitoring without requiring user action

SSO, MFA, Zero-password

Access control via per-app VPN to on-premises apps

Provision secure workspace, distribute apps and remote wipe

with one console

MobileIron Confidential

Page 18: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

SECURE AND MANAGE ENDPOINTS FROM A SINGLE PLATFORM

Policy configuration and enforcement

Application management and distribution

Access control and multi-factor authentication

Threat detection and remediation

Drive business resiliency in the zero-trust world

Increase user adoption and compliance

Secure any device with any deployment for true

freedom of choice

Enhanced support Task Workers

Contractors - MAMBYOD

Data protection and Threat prevention

Analytic insight

Capabilities Benefits Use cases

MobileIron Confidential

Page 19: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

ENABLE CLOUD SERVICES WITH SINGLE SIGN-ON

One-touch MFA

Password-less SSO

Adaptive policy engine

Protect data from unauthorized users,

devices, and apps using adaptive security policies

Provide a great user experience with

password-less sign-on

Secure enterprise cloud services such as

IT compliance for cloud with granular access

control policies

Capabilities Benefits Use cases

MobileIron Confidential

Page 20: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

REAL-TIME, ON-DEVICE PROTECTION AGAINST KNOWN AND UNKNOWN THREATS

Capabilities Benefits Attack use cases

Easy to gain 100% user adoption with 1 app and automatic deployment

Insightful with immediate and ongoing visibility and risky app

analysis

On-device detection and remediation without Internet

connectivity

Phishing

Network

Apps

Profiles

Advanced compromise

Threat detection with machine learning algorithms

Detailed threat intelligence

Advanced app analytics

Local threat remediation and user notification on-device

Support for iOS and Android

MobileIron Confidential

Page 21: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

Customers

A PROVEN MOBILE LEADER

Business critical endpoints

Security patents

Revenue renewal rate

Ecosystem partners

Gartner leaders quadrant

Recognition:

Page 22: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

HOUSING CUSTOMERS

Page 23: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

Housing: Mobile Working scenario

Existing issues How to overcome these issues

Roll out of 1,600 Apple mobile devices, including iPhones &

iPads

Roll-out of applications designed by association and a

third party

Moving applications to the cloud to allow employees

access anytime & anywhere

Costly, inefficient, paper-based systems

Tenants left waiting for repairs and home improvements

Disjointed internal communications

MobileIron Confidential

Page 24: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement

MobileIron Confidential

Housing: Mobile Working scenario

How does Mobileiron help? Business Benefits

Revolutionised internal communications

Increased employee productivity -both in the office and in the field

Enabled future considerations for the smart home

Access to corporate apps anywhere and any time

East deployment and management of devices

Peace of mind when deploying corporate applications

Security and visibility of any traffic up and down the network

Support for iOS and Android

MobileIron Confidential

Page 25: MobileIron: Mobile-centric, Zero Trust Security€¦ · Assume bad actors are on your network. MobileIron Confidential WHO’S GOING TO FULLY SECURE ... Policy configuration and enforcement